Editing National Security Law Dycus/7th ed. Outline

From wikilawschool.net. Wiki Law School does not provide legal advice. For educational purposes only.
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 7: Line 7:
|related=
|related=
}}
}}
{{Text-Specific Outline stub}}
==INTRODUCTION==
===Purposes===
===Organization===
==PROVIDING FOR THE “COMMON DEFENCE”: THE ORIGINAL UNDERSTANDING==
===The Constitutional Text===
===Pre-Constitutional History and Political Theory in Europe===
===The American Experience Prior to 1787===
===The Framers’ View===
====The Convention====
====Ratification====
==THE PRESIDENT’S NATIONAL SECURITY POWERS==
===The Spectrum of Presidential Power===
====When the President Acts Pursuant to Delegated Authority in Foreign Relations====
====When the President Acts in the “Zone of Twilight” in Foreign Relations====
====When the President Takes Measures Incompatible with the Expressed or Implied Will of Congress in Foreign Relations====
===The Commander in Chief’s War Powers===
====Defensive War Power====
====Customary War Power====
====“Core” Presidential War Power and Statutory Limits====
===The President’s Emergency Powers===
====The National Emergencies Act and Standby Emergency Legislation====
====Independent Executive Emergency Authority?====
==CONGRESS’S NATIONAL SECURITY POWERS==
===Congressional Authorizations for War===
====Formal Declaration of War====
====Authorizing War by Statute====
====Limiting War Power? The War Powers Resolution====
=====The Recital of Presidential War Powers=====
=====Consultation=====
=====Triggers and the Reporting Requirements=====
=====The 60-Day Clock=====
=====The Concurrent Resolution=====
=====The Rule of Construction=====
===Delegations and Appropriations for National Security===
====Delegations of National Security Authority====
====Implied Authorization by Defense Appropriation====
====Wielding the Appropriations Power====
===Limitations on Congressional War Powers===
====The Nondelegation Principle====
====The Lovett Principle====
====The Chadha Principle====
==THE COURTS’ NATIONAL SECURITY POWERS==
===The Federal Judicial Power Generally===
===A Self-Defining Role for Courts: The Justiciability Doctrines===
====Standing to Sue====
====The Political Question Doctrine====
====Ripeness====
===Substantive Hurdles: Bivens and Qualified Immunity===
====A Cause of Action?====
====Qualified Immunity====
===Evidentiary Hurdles: The State Secrets Privilege===
==THE DOMESTIC EFFECT OF INTERNATIONAL LAW==
===The Making and Interpretation of Treaties===
===Executive and Other Agreements===
===The Domestic Legal Effect of Treaties and Executive Agreements===
===Statutory Incorporation of International Law===
===The Domestic Legal Effect of Customary International Law and ''Jus Cogens''===
==THE EXTRATERRITORIAL REACH OF U.S. LAW”==
===Extraterritorial Reach of Constitutional Rights===
===Extraterritorial Effect of U.S. Statutes===
==THE RIGHT TO WAGE WAR (''JUS AD BELLUM'')==
===Law Regarding Resort to the Use of Force: The Basic Elements===
===Content of ''Jus ad Bellum''===
==INTERNATIONAL HUMANITARIAN LAW (''JUS IN BELLO'')==
===Authorities for ''Jus in Bello''===
===Applying IHL — Conflict Classification and Combatant Immunity===
==HOW WE GO TO WAR: LESSONS FROM VIETNAM==
===Going to War in Vietnam===
===Limiting the Scope of the Vietnam War===
===Ending the Vietnam War===
==COLLECTIVE USE OF FORCE==
===The Korean “Police Action”===
===The 1991 Persian Gulf War===
===Afghanistan===
==UNILATERAL USE OF FORCE==
===Self-Defense and Reprisal===
===Preemptive Self-Defense===
===Addressing New Threats: Syria, the Islamic State, and Iran===
===Rescue===
==TARGETING TERRORISTS==
===Targeted Killing by the United States After 9/11===
===Targeted Killing and Human Rights Law (HRL)===
===Targeted Killing and International Humanitarian Law (IHL)===
===U.S. Law and the Targeting of U.S. Citizens===
==CYBER OPERATIONS==
===Assessing the Risk of Cyber Warfare===
===Applying International Law to Cyber Operations===
===Applying Domestic Law to Cyber Operations===
===Cyber War of Ideas===
==NUCLEAR WAR==
===The Nature and Effects of Nuclear Weapons===
===International Law of Nuclear Weapons===
===Domestic Law of Nuclear Weapons===
==HUMANITARIAN AND PEACE OPERATIONS==
===Authority for Peaceful Deployments===
===Crossing the Mogadishu Line: Good Intentions Gone Terribly Wrong===
===Humanitarian Intervention in Libya — 2011===
==INTRODUCING INTELLIGENCE==
===The Intelligence Cycle===
===How Is Intelligence Collected? — The “INTS”===
===Covert Actions===
==THE INTELLIGENCE COMMUNITY: ORGANIZATION AND AUTHORITY==
===Authority for Intelligence Activities===
===Funding and Managing the Intelligence Community===
===Coordination and Sharing of Intelligence===
==COVERT OPERATIONS==
===Curtailing Private Actions===
===Early CIA Covert Operations===
===CIA Operations and Congressional Oversight===
===The Iran-Contra Affair===
===Continuing Oversight Reforms===
===Special Military Operations===
===Outsourcing Secret War===
==THE FOURTH AMENDMENT AND NATIONAL SECURITY==
===The Fourth Amendment Framework===
===A National Security Exception?===
=== A Foreign Intelligence Exception?===
===Surveillance Abroad===
==CONGRESSIONAL AUTHORITY FOR FOREIGN INTELLIGENCE SURVEILLANCE==
===The Foreign Intelligence Surveillance Act: Core Requirements===
===FISA, Law Enforcement, and the Fourth Amendment===
===FISA Trends===
==PROGRAMMATIC ELECTRONIC SURVEILLANCE FOR FOREIGN INTELLIGENCE==
===Case Study: The Terrorist Surveillance Program===
===The FISA Amendments Act and the Future of Programmatic Surveillance===
==THE THIRD-PARTY DOCTRINE: ORIGINS AND APPLICATIONS==
===Origins of the Third-Party Doctrine===
===Applications of the Third-Party Doctrine===
==THE COLLECTION AND USE OF THIRD-PARTY RECORDS==
===Targeted Collection of Third-Party Records===
===Bulk Collection of Third-Party Records===
===Data Mining===
==SCREENING FOR SECURITY==
===Checkpoint Searches===
===Watch Listing===
==PROFILING AND TRAVEL BANS==
===Profiling===
===The Trump Administration Travel Bans===
==HABEAS CORPUS: THE STRUCTURE OF THE SUSPENSION CLAUSE==
===The Origins of the Suspension Clause===
===The Habeas Corpus Statute(s)===
===Suspending the Writ===
===The Effects of a Valid Suspension===
==HABEAS CORPUS: THE SCOPE OF THE SUSPENSION CLAUSE==
===Geographic Scope of the Suspension Clause===
===Review Required by the Suspension Clause===
==MILITARY DETENTION OF U.S. PERSONS==
===The Internment Camps and the Non-Detention Act===
===Military Detention of U.S. Persons Captured Overseas===
===Military Detention of U.S. Persons Captured in the United States===
===Codification of Military Detention===
==MILITARY DETENTION OF NON-U.S. PERSONS==
===Substantive Authority to Detain Non-U.S. Persons===
===The Process for Proving Detainability===
===The Next Generation of Guantánamo Litigation===
===“Closing” Guantánamo===
==PREVENTIVE DETENTION==
===Constitutional Limits on Preventive Detention===
===“Spitting on the Sidewalk”: Pretextual(?) Criminal Detention===
===The Post-9/11 Roundup of “High Interest” Detainees===
===Material Witness Detentions===
==INTERROGATING TERRORIST SUSPECTS==
===When Is Interrogation Torture?===
===The Legal Standards and their Application===
==CASE STUDY OF COERCIVE INTERROGATION OF DETAINEES IN U.S. CUSTODY AFTER 9/11==
===The Evolving History of U.S. Interrogation of Suspected 997
Terrorists===
===Applying the Interrogation Laws===
== CRIMINALIZING TERRORISM AND ITS PRECURSORS==
===“Boom” Terrorist Crimes===
===“Left of Boom” (Precursor) Crimes===
===Treason===
===The Long Arm of the Law: Extraterritorial Criminal Jurisdiction===
==TERRORISM TRIALS: PROCEDURE AND EVIDENCE==
===National Security Criminal Procedure: Miranda, Presentment, and Speedy Trial===
===Coerced Evidence===
===Secret Evidence===
===Access to Secret Exculpatory Testimony===
===Do We Need a National Security Court?===
==TRIAL BY MILITARY COMMISSION==
===Trial by Military Commission Before 9/11===
===Trial by Military Commission After 9/11: The First Phase===
===Military Commissions After Hamdan===
==HOMELAND SECURITY==
===Worst-Case Scenario: A Plague on Your City===
===The Federal Response Role===
===First Responders: State and Local Responses===
===Responding to Biological Threats 1175 Case Study: The 2014 Ebola Virus Epidemic===
==THE MILITARY’S DOMESTIC ROLE==
===The Traditional Role of the Military in American Society===
===Domestic Military Intelligence Collection===
===The Military’s Role in Responding to Domestic Emergencies===
===Martial Law: When Planning Fails===
==SAFEGUARDING NATIONAL SECURITY INFORMATION==
===Balancing Secrecy, Security, and Self-Determination===
===Classification of National Security Information===
===Restricting Access to Sensitive Information: Security Clearances===
===Criminal Prosecution of Leakers: The Espionage Act===
===“Authorized” Leaks===
==ACCESS TO NATIONAL SECURITY INFORMATION==
===The Freedom of Information Act===
===Other Open Government Laws===
===Non-Statutory Rights of Access===
===Congress’s Right of Access===
==CENSORSHIP==
===Fundamentals of Censorship: The Pentagon Papers Case===
===Wikileaks: The New New York Times?===
===Publication as a Crime?===
===Shooting the Messenger’s Messenger?===
Please note that all contributions to Wiki Law School are considered to be released under the Creative Commons Attribution-Sharealike 3.0 Unported License (see Wiki Law School:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!
Cancel Editing help (opens in new window)